Lines Matching full:encryption
325 Published by State Encryption Management Bureau, China,
345 tristate "AES (Advanced Encryption Standard)"
363 tristate "AES (Advanced Encryption Standard) (fixed time)"
373 solely on encryption (although decryption is supported as well, but
376 Instead of using 16 lookup tables of 1 KB each, (8 for encryption and
403 ARIA is a standard encryption algorithm of the Republic of Korea.
462 CAST6 (CAST-256) encryption algorithm (RFC2612)
469 DES (Data Encryption Standard)(FIPS 46-2, ISO/IEC 18033-3) and
505 national standard encryption algorithm of the Republic of Korea.
557 TEA (Tiny Encryption Algorithm) cipher algorithms
559 Tiny Encryption Algorithm is a simple cipher that uses
563 Xtendend Tiny Encryption Algorithm is a modification to
567 Xtendend Encryption Tiny Algorithm is a mis-implementation
577 Twofish was submitted as an AES (Advanced Encryption Standard)
601 Adiantum tweakable, length-preserving encryption mode
603 Designed for fast and secure disk encryption, especially on
613 bound. Unlike XTS, Adiantum is a true wide-block encryption
688 for AES encryption.
703 HCTR2 length-preserving encryption mode
705 A mode for storage encryption that is efficient on processors with
717 KW (AES Key Wrap) authenticated encryption mode (NIST SP800-38F
749 normally even when applied before encryption.
792 menu "AEAD (authenticated encryption with associated data) ciphers"
829 authenticated encryption mode (NIST SP800-38C)
839 GCM (Galois/Counter Mode) authenticated encryption mode and GMAC
868 This IV generator generates an IV based on the encryption of
879 dm-crypt. It uses the hash of the block encryption key as the
880 symmetric key for a block encryption pass applied to the input
882 encryption.
886 type of the first template argument), and which defers encryption
899 block encryption)